GHSA-vh73-q3rw-qx7w

Suggest an improvement
Source
https://github.com/advisories/GHSA-vh73-q3rw-qx7w
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-vh73-q3rw-qx7w/GHSA-vh73-q3rw-qx7w.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vh73-q3rw-qx7w
Aliases
Published
2024-02-05T21:30:31Z
Modified
2024-06-28T15:58:33.006056Z
Severity
  • 8.0 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Boundary vulnerable to session hijacking through TLS certificate tampering
Details

Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application.

References

Affected packages

Go / github.com/hashicorp/boundary

Package

Name
github.com/hashicorp/boundary
View open source insights on deps.dev
Purl
pkg:golang/github.com/hashicorp/boundary

Affected ranges

Type
SEMVER
Events
Introduced
0.8.0
Fixed
0.15.0